Answer: This product uses triple security authentication, anti-counterfeiting identity, end-to-end data encryption, and anti-stealing, and the network side also cannot read equipment and user data. The device end adopts the strictest firewall and security audit strategy, the third-party cloud shield is used to prevent the intrusion network side, and the maximum 300GDOS attack is protected. Therefore, please feel free to use it. This product will neither disclose privacy nor be mobilized by malicious code as a “broiler” attack on other Internet devices.
